WO2006054109A2 - Systeme et procede pour stocker des informations de revision - Google Patents

Systeme et procede pour stocker des informations de revision Download PDF

Info

Publication number
WO2006054109A2
WO2006054109A2 PCT/GB2005/004473 GB2005004473W WO2006054109A2 WO 2006054109 A2 WO2006054109 A2 WO 2006054109A2 GB 2005004473 W GB2005004473 W GB 2005004473W WO 2006054109 A2 WO2006054109 A2 WO 2006054109A2
Authority
WO
WIPO (PCT)
Prior art keywords
information
revision
file
revision information
data
Prior art date
Application number
PCT/GB2005/004473
Other languages
English (en)
Other versions
WO2006054109A3 (fr
Inventor
James Bayley
Original Assignee
James Bayley
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by James Bayley filed Critical James Bayley
Publication of WO2006054109A2 publication Critical patent/WO2006054109A2/fr
Publication of WO2006054109A3 publication Critical patent/WO2006054109A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/197Version control
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/169Annotation, e.g. comment data or footnotes

Definitions

  • This invention relates to a system and method for storing revision information, for example in digital files and streams.
  • Computers are used to store and process information which is often stored in data containing constructs such as files. All information is fundamentally stored as binary strings which are sequences of "1" or "0" values called bits. A file has a file name which uniquely identifies its information.
  • a special type of data containing construct is a "stream". Examples of streams include television, radio, and internet broadcasts. Streams are also used extensively within computer systems. A stream is a flow of binary information from a stream source (e.g. a computer system) and to a stream consumer (e.g. a web browser).
  • a stream source e.g. a computer system
  • a stream consumer e.g. a web browser
  • Both files and streams contain information which may be defined as data content.
  • the file or stream format defines how the content should be decoded by a program.
  • the content of a plain text file is a string of bytes, each byte representing a character in the document.
  • FIG. 1 illustrates this process.
  • a first version 11 of the file is opened in an editor 15 for editing.
  • the editor 15 stores a current version 13 of the file and a revision history 14 of changes made to the file.
  • the editor 15 may perform a save operation creating a second version 12 of the file.
  • the second version of the file 12 replaces the first version 11.
  • Versions of streams are analogous to versions of files. For example, the application of the graphical equalisers to an audio input which created an audio stream would create a second version of the stream.
  • Figure 2 illustrates a treatment of a generic stream.
  • the first stream 21 is received by a stream processor 25, which may include a filter 24.
  • Stream processor 25 applies the filter 24 to the first version 21 of the stream and outputs a second version 22 of the stream.
  • Files and streams may be revised many times by the same person or system or by different people and systems in different locations and at different times.
  • revision information may for example, comprise information about revisions, versions, revision history, version history and annotations to be stored within a file such that an editor cannot undo changes step by step or at all and that many formats which do allow this information to be stored do so in a proprietary manner that requires a particular editor to be used.
  • the source code of computer programs is usually plain text. Examples of programming languages include, without limitation: JavaTM, C#TM, PHP, Perl and ColdFusionTM.
  • a source code control system stores previous versions of a file. Implementation of a source code control system can be a costly and time consuming exercise.
  • the present invention relates to systems and methods to install and recall revision and annotation information in digital files and streams. This information can be interpreted directly by the user or by the software tool. As a result, in the above example a plain text editor would be able to offer the undo feature on a newly opened document even though it did not support that functionality.
  • figure 1 illustrates the relationship between a first version and a second version of a file
  • figure 2 illustrates a treatment of a generic stream
  • figure 3 illustrates a "save" operation
  • figure 4 shows a flow chart detailing the operation of an editor
  • figure 5 illustrates the separate components of processor step 86 shown in figure 4
  • figure 6 illustrates a stream
  • figure 7 illustrates the concept of reverse delta
  • figure 8 illustrates an example of revisions made to a file
  • figures 9 A, B and C illustrate different representations of differences between a first version and a second version of the file shown in figure 8
  • figure 10 shows a flow chart detailing the operation of a source code editor
  • figure 11 illustrates an annotation made to a version of a file.
  • Embodiments of the present invention provide a system and method for storing revision information such as revisions, versions, revision history, version history and annotations in a data containing construct such as a file or stream using, for example, steganographic techniques such that the content of the file or stream remains fit for purpose and the revision information can be saved in the file or the data storage format which do not support that functionality.
  • an embodiment of this invention would provide an alternative method of storing such information using, for example, steganographic techniques such that the content of the file or stream remains fit for purpose and the revision information is accessible to any program which incorporates this invention.
  • Steganography is a well developed technology which includes many methods of hiding information in files so that it is not perceptible to the casual observer. It is often possible to store additional information within a file without rendering it unfit for its purpose. Steganographic techniques have been published which enable information to be hidden and extracted from many file formats.
  • a file format may define that information is only to be written to the first 1000 bytes. Information appended to the file after the first 1000 bytes would be hidden. Containing information within HTML comment tags; web browsers do not display such information.
  • a text file may be hidden in a 24 bit colour bitmap file by substituting the least significant bit of a colour component of each pixel with a bit from the text file.
  • the information may be regarded as hidden because it is very hard to detect other than by attempting to decode a text file from the least significant bit of the colour component of each pixel.
  • a text file could be inserted into the comment block of a source code file. The text file would be very easily identified by opening the source code file in an editor, but the source code file would remain fit for purpose, where the purpose is to compile a program.
  • Steganography is used in the present invention to ensure files remain fit for purpose, but in some applications it is also important that added revision information is also hidden. The requirements of the application dictate which type of steganography is appropriate.
  • Some steganographic techniques have limits as to how much data may be hidden within them. For example, in the case of a text file hidden in a 24 bit colour bitmap file by substituting the least significant bit of the colour component of each pixel with a bit from the text file, the number of bits in the text file that is hidden is limited to the number of pixels in the image. A larger text file may be hidden in the image file if the text file is first compressed. Compression will be discussed in more detail below.
  • Figure 3 illustrates the manner in which steganographic techniques can be applied to incorporate revision information into a file according to an embodiment of the present invention.
  • a first version 31 of a file is opened for editing in an editor 35.
  • the editor 35 maintains a current version 33 of the file and a list of revisions or a revision history 34.
  • the editor 35 may offer a user an undo function which allows the user to move through the revision history in a stepwise manner undoing each revision they have made to the open file.
  • the editor 35 has a "stegasave" function.
  • the editor 35 When performing a stegasave, the editor 35 steganographically includes the revision history 34 into the current version 33 of the file and stores this as a second version 32 of the file, the second version 32 of the file replacing the first version 31 of the file. Accordingly, when the user initiates another editing session, the second version 32 of the file may be opened in the editor 35. Upon opening the file 32, editor 35 detects the presence of steganographically stored revision information in the file 30 and extracts this information. The editor 35 has a current version 33 of the file and a revision history 34.
  • a version of the file is preferably stored on a data storage device such as a computer hard disc or flash memory drive.
  • the editor 35 is preferably a software program running on a computer attached to the storage device. During editing, the editor 35 preferably maintains the current version 33 of the file and the revision history of the file 34 in a temporary memory of the computer such as RAM. During editing the computer preferably displays the current version 33 of the file on a display device attached to the computer.
  • the revision information is preferably compressed by editor 35 prior to being stored in the second version 32 of the file. This advantageously increases the number of annotations and revisions or total amount of revision information which can be steganographically stored within a file or stream.
  • the revision information is preferably represented using an XML representation to advantageously promote interoperability between software tools and to enable a single software tool to read the revisions and annotations made to many different file formats.
  • Source code is typically stored in text files, which may be repeatedly edited. Each version may have amendments made by different users. It is possible that a particular user will make undesirable amendments to the source code, at which stage it will be desirable to roll back the version of the source to an earlier version. By storing earlier version information in the file as part of a steganographic save operation, it is possible to roll back a particular version of the source code to an earlier version.
  • part of the additional information stored in a file may be author information.
  • Author information allows a user to determine which user made which amendments to a file. This is particularly useful in the field of source code control, whereby a user, editor or author of a particular section of code may be identified.
  • a source code editor which records a revision history during editing of a source code file, and which stores revision information in the source code file, comprising modifying the data content of the source code file so as to represent revision information in the source code file in a non-proprietary format.
  • the source code file may still be compiled by a suitable compiler. Storing the revision information in the file in a non-proprietary format may require the application of a steganographic technique.
  • Encryption It is often necessary to ensure that information within a file can only be read by authorized users. One method of doing this is to employ encryption which scrambles the message so it is not readable by unauthorized users. The original message is clear text and the encrypted message is cipher text. A key is used to encrypt and decrypt the message. Encryption is a well developed discipline and examples include:
  • Symmetric ciphers such as DES3 where the same key is used to encrypt and decrypt the message
  • Asymmetric ciphers such as RSA where different keys are used to encrypt and decrypt the message. These permit the publication of the encryption keys and are called Public Key systems.
  • the revision information can be encrypted for security.
  • the software tool may also decrypt and present revised and annotated files to the user without user interaction.
  • an image file might contain two versions: one suitable for adults; and the other suitable for children.
  • a web browser could render the appropriate image dependent on whether the user of the web browser was an adult or a child.
  • the proprietor of a file may then protect valuable information contained within the file.
  • Examples of the benefits of encryption include that a content owner may encrypt the revision information using a secret key and may then publish an image on the Internet containing a full workflow history; and a member of the public will not be able to read his private information, but if the content owner subsequently wishes to edit the image the revision information is made available to him.
  • a publisher of a software tool which can store revision information in a file may also encode a secret key within the tool, or remotely but accessible to the user, so as to ensure that revision information can only be viewed by users using their software tool.
  • the user can enter a secret key into the software tool or a public key/private key system can be adopted.
  • a content owner may take a high value file and revise it to make it lower value, for example by blurring an image or disabling the future use of any computer program.
  • the user may then take physical possession of all the information necessary to regenerate the high value content with the exception of an encryption key.
  • the content owner may then sell the encryption key to the user in order to allow the user to undo the revision and review the high value content.
  • Specific implementations of this may include removing and restoring high quality images such as maps or removing or restoring capabilities to a software program by modifying the executable code or the source code.
  • the revision information can be compressed.
  • computers store information as strings of bits.
  • the use of higher level file formats often result in data strings which contain more bits than are necessary to represent the information.
  • Compression technologies use algorithms to reduce the number of bits used to store the information.
  • the compression may be lossless in which case an inverse algorithm can restore the original content exactly, or lossy in which case the original content cannot be restored exactly.
  • An example of lossless compression is the LZW algorithm used to create "zip" archives.
  • An example of lossy compression is that used to generate JPEG images.
  • Figure 4 shows a flow chart detailing the operation of the editor 35 described above.
  • a first version 41 of the file is opened at step 40 and a revision is made to the content at step 43 resulting in a modified current version 44 of the file having a different content, shown as content'.
  • the file 44 is stored in temporary memory.
  • the software tool Prior to performing a stegasave at step 45, the software tool processes revision information at step 43 to generate revision information, which is preferably in XML format.
  • Processor step 46 preferably also comprises a compression step, wherein the XML revision information is compressed.
  • Processor step 46 preferably also comprises an encryption step, wherein the compressed information is encrypted.
  • the revision information is then steganographically encoded into the current version 44 of the file, and the file is stored as a second version 42.
  • Figure 5 illustrates the separate components of processor step 46 shown in figure 4.
  • data to be stored in the file is selected from: revisions 50, versions 51 , revision history 52, version history 53, and annotations 54.
  • the selection may be made according to predetermined or user determined criteria.
  • the criteria may be specific to the file type being edited.
  • the selected data is converted to XML at step 56, and compressed at step 57.
  • the data is then encrypted at step 58 to produce revision information 59.
  • An advantage of storing the revision information steganographically is that the content of the file remains fit for purpose.
  • the advantage of this is that the file does not need further processing before being used in a player or viewer.
  • a file in the JPEG form containing steganographically stored revision information would still render in a web browser. Therefore, files encoded with additional revision information according to the present invention may be distributed and viewed in standard software appropriate for reading files of the relevant format.
  • revisions to other file types include without limitation:
  • a stream processor 65 receives a first stream 61 and additional information 63 which may comprise:
  • the first stream 61 and additional information 63 are received and processed by stream processor 65 to produce a second stream 62 containing revision information.
  • the stream processor 65 may additionally comprises a selector 64, which selects a component of the additional information 63 to be stored within the second stream 62.
  • the stream processor 65 may additionally comprise a filter 66, which when applied to the first stream 61 produces an alternative version of the stream. Selector 64, may then steganographically encode the revision information such that a user receiving second stream 62 may select between a filtered and the original non-filtered content.
  • Revisions to streaming media examples include without limitation:
  • the revision information may comprise a revision history defining the changes made to a first version of a file in order to generate a second version of the file.
  • the revision information may describe annotations.
  • An annotation may take the form of an instruction, additional information, or a comment.
  • Annotations may be stored in an XML format and a software tool which reads and writes revision information to the file may have the ability to change the presentation of the revision information in terms of text, style and colour, for example. This function may be implemented using standard technologies such as cascading style sheets.
  • a first technique is to apply a "reverse delta".
  • the reverse delta between a second version of a file and a first version of the file is the change that would need to be made to the second version of the file to recreate the first version of a file.
  • Figure 7 illustrates the concept of reverse delta.
  • Revisions 73 made to the first version 71 of the file create the second version 73 of the file.
  • the reverse delta 74 is calculated from the first version of the file 71 and the second version of a file 72 by a difference program.
  • the reverse delta 74 operation recreates an exact copy of the first version 71 of the file from the second version 72 of the file. However, in some situations this recreation does not need to be exact.
  • the first version of the file and the second version of the file were image files such as JPEG images it would be sufficient that the reverse delta when the delta was applied to the second version of the file produced a good approximation the first version of the file.
  • FIG 8 illustrates an example of revisions made to a file.
  • the file PATENT.TXT is opened at step 83.
  • a first version 81 of this plain text file contains a string "ABCDEF”.
  • the "A" is deleted. This is a revision.
  • This revision would result in a current version of the file shown at 85.
  • a "G” is appended to this string of characters; this is a second revision.
  • the second revision results in the string of characters in the current version 87 of the file.
  • a record of the sequence of the revisions is the revision history.
  • the current version 87 of the file is stored during a save operation to give a second version 82 of PATENT.TXT which contains the string "BCDEFG".
  • Figure 10 shows the operation of a source code editor.
  • a user editor or author logs in such that their identity is recorded.
  • the editor opens a source code file "source.txt".
  • Source.txt contains code 102.
  • the user edits or modifies source.txt at step 103 to create code' 104.
  • the source code editor records a revision history as described above and at step 105 this revision history is processed into revision information.
  • the revision information also includes information identifying the user that logged into the system at step 100.
  • a steganographic save operation is performed which stores: revised code 107, which is equivalent to code'; and the revision information which includes user information in the file source.txt.
  • the revision information is generated by a reverse delta operation.
  • the user login step 100 is implemented during the steganographic save operation step 106.
  • a user may be required to identify themselves by a username and password combination, or alternatively, the user may simply be required to provide label for the revisions that are about to be saved.
  • source code languages include, without limitation: JavaTM, C#TM, PHP, Perl and ColdFusionTM.
  • a source code control system is thus provided that stores previous versions of a source code document. Further, the source code control system provided may store user identity or label information in conjunction with revision information. The source code control system described may thus be easily implemented at relatively low cost.
  • Annotation can be any appropriate form and incorporated in any appropriate manner.
  • Annotations are usually (but need not be) pieces of information about the contents of a file.
  • the defining characteristic of an annotation is that it can (but need not) refer to a position in the file or stream.
  • annotations There are many possible ways of making and specifying annotations. Examples include without limitation:
  • FIG. 11 illustrates an annotation 112 made to a version of PATENT.TXT 111.
  • An annotation of an image file might be the latitude, longitude, and settings of the camera which made the image file
  • the invention may be embodied in a software tool.
  • the software tool allows a user to edit files and to stegasave files.
  • the software tool may be a specifically designed program or may be a file editing program modified to perform stegasaves.
  • the tool or a complementary tool can allow decoding/decrypting and presentation of a modified data construct including revision information.
  • the software tool allows a user to undo a revision.
  • Each revision may be undone independently, in a stepwise manner or alternatively, all revisions made to a version of a file may be undone in order to allow a user to revert to a prior version of the file.
  • the software tool allows a user to make additional revisions to a file and to store information describing these revisions with previously retrieved revision information in the file.
  • the software tool also has the ability to insert, update or delete annotations stored within the file.
  • the software tool may allow for protection of annotations and revisions from deletion or modification by an authorised user.
  • the software tool also has an option to permanently incorporate revisions into a version of the file.
  • the software tool can permanently incorporate annotations into a version of the content.
  • the steganographically included annotation "cat" could be incorporated into a JPEG image by making the appropriate pixels black to represent the letters C, A and T. This process is sometimes called flattening the image.
  • the software tool can revert to a previous version of the file, for example a certain version number or the version at a predetermined time, and restore all revisions and annotations made to the file subsequent to a previous version of the file being made, and offer the option of discarding or accepting all revisions or annotations made prior to a particular version.
  • the software tool can offer the option of extracting one or more versions of a particular file to at least one new file.
  • Each of the new files may optionally contain the prior versions of the particular file.
  • Presentation of the information can be governed by configuration information stored in the presentation tool or remotely accessed, for example applying standard technologies such as XSL, XSLT or CSS.
  • the software tool includes additional functionality. It can measure and report the capacity of the content to store additional information steganographically.
  • the software tool may generate and store a checksum or hash which may be used to identify a particular version of the content.
  • the checksum or hash advantageously allows the point at which the versions branched to be easily detectable.
  • the software tool may allow a user to manually edit steganographically incorporated information by optionally showing or hiding the revisions and annotations to the user. For example, a HTML editor might by default, hide from the user this text:
  • the software may additionally comprise a WYSIWYG editor having a text mode then the user would be allowed to edit the annotation directly.
  • the software tool may modify the content of the file for the purpose of creating a region of the content which is suitable to receive steganographically encoded information.
  • a JPEG image may have a grey border added to it. This border would not render the image unfit for its purpose of being viewed in a web browser on a grey background, but the border advantageously allows for the steganographic storage or revision information in the file. This function is of particular use where larger revisions are needed for small images.
  • a text document may have a comment block inserted at the end of the file into which the revision history of the file is written.
  • the sampling rate of an audio file may be increased to provide additional data within which revision information may be steganographically encoded.
  • the software tool additionally offers a user the ability to store and recall information, and change the format of the file during store and recall operations. For example:
  • a rich image file format such as PSD could be saved as a JPEG image, all the information required to generate the rich image file may be stored steganographically in the JPEG;
  • a DOC document may be stored as a text file, but all the information required to regenerate the DOC document is steganographically stored in the text file.
  • the software tool may additionally store information about the device that generated the content.
  • the revision information comprises creation of information such as:
  • the software tool may store additional information "on the fly". For example; When a user requests a JPEG image from the web server, the web server applies a blur filter to the image, the web server uses this invention to store the information required to remove the blur in the image; and the web server serves the new version of the image.
  • the revision information may be a reference to a location of information regarding revisions, versions, revision history, version history and annotations. Such a reference to a location may comprise a "Uniform Resource Indicator" or "URL" or hyperlink.
  • the information regarding revisions, versions, revision history, version history and annotations is stored at the location which may be on a local storage device, or a remote server. Where the information regarding revisions, versions, revision history, version history and annotations is stored on a remote server, the information is preferably encrypted, and a corresponding key stored as part of the revision information, such that only a user in physical possession of the file may decrypt the revision information. The benefit of this is that the location reference and key may be a smaller amount of information to store in the second version of the file than revision information itself.
  • the present invention provides a new computer program which can store revision information in a file or stream such that the revision information can be subsequently extracted by the program to provide enhanced functionality to the user or provide the user with additional information.
  • the user may be a human or computer process.
  • a patch, module, plug-in or extension for a computer program which enables a conventional file processing program to be modified so as to be able to store, recall and display revision information within a file steganographically according to the present invention.
  • file formats to which this invention could be applied include without limitation text formats such as “HTML”, “XML”, source code, image formats such as “JPEG”, “GIF”, “BMP”, audio formats such as “WAV”, “AIFF”, “AU”, “MPA”, “MP3”, “WAV”, “GSM”, “VMF”, “FA”, “VOX” and video formats such as “MPEG”, “MOV”, “AVI”, “RAM” and “SWF” and executable formats such as “EXE” and "BIN).
  • text formats such as "HTML”, “XML”, source code
  • image formats such as “JPEG”, “GIF”, “BMP”
  • audio formats such as “WAV”, “AIFF”, "AU”, “MPA”, “MP3”, “WAV”, “GSM”, “VMF”, “FA”, “VOX”
  • video formats such as “MPEG”, “MOV”, “AVI”, “RAM” and “SWF”
  • executable formats such as "EXE” and "BIN”.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Document Processing Apparatus (AREA)
  • Stored Programmes (AREA)

Abstract

L'invention concerne un procédé pour stocker des informations de révision dans une structure contenant des données prévue pour contenir un contenu de données, ladite structure contenant des données étant conçue pour contenir uniquement une version de données actuelle et ledit procédé consistant à modifier le contenu de données de façon à ce qu'il représente les informations de révision.
PCT/GB2005/004473 2004-11-22 2005-11-18 Systeme et procede pour stocker des informations de revision WO2006054109A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0425668.1A GB0425668D0 (en) 2004-11-22 2004-11-22 A system and method for storing revision information
GB0425668.1 2004-11-22

Publications (2)

Publication Number Publication Date
WO2006054109A2 true WO2006054109A2 (fr) 2006-05-26
WO2006054109A3 WO2006054109A3 (fr) 2006-07-20

Family

ID=33548667

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2005/004473 WO2006054109A2 (fr) 2004-11-22 2005-11-18 Systeme et procede pour stocker des informations de revision

Country Status (2)

Country Link
GB (1) GB0425668D0 (fr)
WO (1) WO2006054109A2 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9411974B2 (en) 2013-12-03 2016-08-09 International Business Machines Corporation Managing document revisions

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0769739A2 (fr) * 1995-10-20 1997-04-23 Sun Microsystems, Inc. Système et procédé pour intégrer l'édition et le contrÔle de version dans des mémoires de données
US20020002567A1 (en) * 2000-06-30 2002-01-03 Yukie Kanie Method and system for managing documents

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0769739A2 (fr) * 1995-10-20 1997-04-23 Sun Microsystems, Inc. Système et procédé pour intégrer l'édition et le contrÔle de version dans des mémoires de données
US20020002567A1 (en) * 2000-06-30 2002-01-03 Yukie Kanie Method and system for managing documents

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "HTML 4.01 Specification" W3C, [Online] 24 December 1999 (1999-12-24), XP002378458 W3C Retrieved from the Internet: URL:http://www.w3.org/TR/REC-html40/struct /text.html#edef-del> [retrieved on 2006-04-26] *
LANGELAAR GERHARD C; SETYAWAN IWAN; LAGENDIJK REGINALD L: "Watermarking Digital Image and Video Data - A State-of-the-Art Overview" IEEE SIGNAL PROCESSING MAGAZINE, vol. 17, no. 5, September 2000 (2000-09), pages 20-46, XP002378459 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9411974B2 (en) 2013-12-03 2016-08-09 International Business Machines Corporation Managing document revisions

Also Published As

Publication number Publication date
WO2006054109A3 (fr) 2006-07-20
GB0425668D0 (en) 2004-12-22

Similar Documents

Publication Publication Date Title
US8059815B2 (en) Transforming data files into logical storage units for auxiliary data through reversible watermarks
US9009482B2 (en) Forensic marking using a common customization function
US20020150239A1 (en) Method for personalized encryption in an un-trusted environment
US20030190054A1 (en) Method and system for distributing digital content with embedded message
JP2008518315A (ja) タイムラインファイルに注釈を付ける方法
US7496197B2 (en) Method and system for robust embedding of watermarks and steganograms in digital video content
GB2330031A (en) Copying control for watermarked digital data
KR20090088432A (ko) 트랜잭션 마킹에 의한 시청각 데이터의 안전한 배포 방법 및 시스템
US9514504B2 (en) Encoding/decoding message by selectively adjusting characteristics of sub-units in image data
Dickman An overview of steganography
US20080027864A1 (en) Method and system for preventing skipping playback of a special content section of a digital media stream
CN101404055A (zh) 媒体内容版权保护的方法
CN102158768B (zh) 基于mp4文件封装格式的视频认证水印嵌入和提取方法
WO2011149987A2 (fr) Fil de sécurité permettant de protéger un contenu multimédia
Noor et al. High performance and energy efficient image watermarking for video using a mobile device
WO2006054109A2 (fr) Systeme et procede pour stocker des informations de revision
US20110261997A1 (en) Forensic mark insertion apparatus and method
CN100373408C (zh) 可察觉的可逆水印
US20040034667A1 (en) Incorporating data into files
JP2007193654A (ja) コンテンツ記録装置、コンテンツ処理方法、およびプログラム
Guo et al. Information hiding in ooxml format data based on the splitting of text elements
KR102531477B1 (ko) 발췌된 원문의 정보를 제공하는 논문 작성 시스템의 서버 및 사용자 단말기
CN113296773B (zh) 一种层叠样式表的版权标注方法和标注系统
JP3774631B2 (ja) 情報埋め込み装置及び情報復元装置及び方法及びコンピュータプログラム及び記憶媒体
Bhattacharyya et al. Handwritten signature authentication scheme using integrated statistical analysis of bi-color images

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05807941

Country of ref document: EP

Kind code of ref document: A2